Rule Library

Sigma Rules

1,701 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

Suspicious Invoke-WebRequest Execution

Detects a suspicious call to Invoke-WebRequest cmdlet where the and output is located in a suspicious location

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Nasreddine Bencherchali (Nextron Systems)Tue Aug 02windows
Detectionhighexperimental

Suspicious Kerberos Ticket Request via CLI

Detects suspicious Kerberos ticket requests via command line using System.IdentityModel.Tokens.KerberosRequestorSecurityToken class. Threat actors may use command line interfaces to request Kerberos tickets for service accounts in order to perform offline password cracking attacks commonly known as Kerberoasting or other Kerberos ticket abuse techniques like silver ticket attacks.

WindowsProcess Creation
TA0006 · Credential AccessT1558.003 · Kerberoasting
Swachchhanda Shrawan Poudel (Nextron Systems)Tue Nov 18windows
Detectionhightest

Malicious PowerShell Commandlets - ProcessCreation

Detects Commandlet names from well-known PowerShell exploitation frameworks

WindowsProcess Creation
TA0002 · ExecutionTA0007 · DiscoveryT1482 · Domain Trust DiscoveryT1087 · Account Discovery+6
Nasreddine Bencherchali (Nextron Systems)Mon Jan 02windows
Detectionhightest

Potential PowerShell Obfuscation Via WCHAR/CHAR

Detects suspicious encoded character syntax often used for defense evasion

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShellTA0005 · Defense EvasionT1027 · Obfuscated Files or Information
Florian Roth (Nextron Systems)Thu Jul 09windows
Detectionhightest

Execution of Powershell Script in Public Folder

This rule detects execution of PowerShell scripts located in the "C:\Users\Public" folder

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
Max Altgelt (Nextron Systems)Wed Apr 06windows
Detectionhightest

RemoteFXvGPUDisablement Abuse Via AtomicTestHarnesses

Detects calls to the AtomicTestHarnesses "Invoke-ATHRemoteFXvGPUDisablementCommand" which is designed to abuse the "RemoteFXvGPUDisablement.exe" binary to run custom PowerShell code via module load-order hijacking.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
François HubautTue Jul 13windows
Detectionhightest

Tamper Windows Defender Remove-MpPreference

Detects attempts to remove Windows Defender configurations using the 'MpPreference' cmdlet

WindowsProcess Creation
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Nasreddine Bencherchali (Nextron Systems)Fri Aug 05windows
Detectionhighstable

Potential Powershell ReverseShell Connection

Detects usage of the "TcpClient" class. Which can be abused to establish remote connections and reverse-shells. As seen used by the Nishang "Invoke-PowerShellTcpOneLine" reverse shell and other.

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
FPT.EagleEye+2Wed Mar 03windows
Detectionhightest

Run PowerShell Script from ADS

Detects PowerShell script execution from Alternate Data Stream (ADS)

WindowsProcess Creation
TA0005 · Defense EvasionT1564.004 · NTFS File Attributes
Sergey Soldatov+2Wed Oct 30windows
Detectionhightest

Run PowerShell Script from Redirected Input Stream

Detects PowerShell script execution via input stream redirect

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1059 · Command and Scripting Interpreter
Moriarty Meng+2Sat Oct 17windows
Detectionhightest

PowerShell SAM Copy

Detects suspicious PowerShell scripts accessing SAM hives

WindowsProcess Creation
TA0006 · Credential AccessT1003.002 · Security Account Manager
Florian Roth (Nextron Systems)Thu Jul 29windows
Detectionhightest

Suspicious Service DACL Modification Via Set-Service Cmdlet

Detects suspicious DACL modifications via the "Set-Service" cmdlet using the "SecurityDescriptorSddl" flag (Only available with PowerShell 7) that can be used to hide services or make them unstopable

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceT1543.003 · Windows Service
Nasreddine Bencherchali (Nextron Systems)Tue Oct 18windows
Detectionhightest

PowerShell Script Change Permission Via Set-Acl

Detects PowerShell execution to set the ACL of a file or a folder

WindowsProcess Creation
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Tue Oct 18windows
Detectionhightest

PowerShell Set-Acl On Windows Folder

Detects PowerShell scripts to set the ACL to a file in the Windows folder

WindowsProcess Creation
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Tue Oct 18windows
Detectionhightest

Deletion of Volume Shadow Copies via WMI with PowerShell

Detects deletion of Windows Volume Shadow Copies with PowerShell code and Get-WMIObject. This technique is used by numerous ransomware families such as Sodinokibi/REvil

WindowsProcess Creation
TA0040 · ImpactT1490 · Inhibit System Recovery
Tim Rauch+1Tue Sep 20windows
Detectionhightest

Exchange PowerShell Snap-Ins Usage

Detects adding and using Exchange PowerShell snap-ins to export mailbox data. As seen used by HAFNIUM and APT27

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShellTA0009 · CollectionT1114 · Email Collection
FPT.EagleEye+1Wed Mar 03windows
Detectionhightest

Suspicious PowerShell Download and Execute Pattern

Detects suspicious PowerShell download patterns that are often used in malicious scripts, stagers or downloaders (make sure that your backend applies the strings case-insensitive)

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)Mon Feb 28windows
Detectionhightest

Suspicious PowerShell Parameter Substring

Detects suspicious PowerShell invocation with a parameter substring

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)+2Wed Jan 16windows
Detectionhightest

Suspicious PowerShell Parent Process

Detects a suspicious or uncommon parent processes of PowerShell

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
Teymur Kheirkhabarov+1Fri Mar 20windows
Detectionhightest

Powershell Token Obfuscation - Process Creation

Detects TOKEN OBFUSCATION technique from Invoke-Obfuscation

WindowsProcess Creation
TA0005 · Defense EvasionT1027.009 · Embedded Payloads
François HubautTue Dec 27windows
Detectionhighexperimental

Suspicious Uninstall of Windows Defender Feature via PowerShell

Detects the use of PowerShell with Uninstall-WindowsFeature or Remove-WindowsFeature cmdlets to disable or remove the Windows Defender GUI feature, a common technique used by adversaries to evade defenses.

WindowsProcess Creation
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
yxinmiracleFri Aug 22windows
Detectionhightest

Net WebClient Casing Anomalies

Detects PowerShell command line contents that include a suspicious abnormal casing in the Net.Webclient (e.g. nEt.WEbCliEnT) string as used in obfuscation techniques

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShell
Florian Roth (Nextron Systems)Tue May 24windows
Detectionhightest

Suspicious Provlaunch.EXE Child Process

Detects suspicious child processes of "provlaunch.exe" which might indicate potential abuse to proxy execution.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)Tue Aug 08windows
Detectionhightest

PUA - 3Proxy Execution

Detects the use of 3proxy, a tiny free proxy server

WindowsProcess Creation
TA0011 · Command and ControlT1572 · Protocol Tunneling
Florian Roth (Nextron Systems)Tue Sep 13windows
Detectionhightest

PUA - Suspicious ActiveDirectory Enumeration Via AdFind.EXE

Detects active directory enumeration activity using known AdFind CLI flags

WindowsProcess Creation
TA0007 · DiscoveryT1087.002 · Domain Account
François HubautMon Dec 13windows
Detectionhightest

PUA - AdFind Suspicious Execution

Detects AdFind execution with common flags seen used during attacks

WindowsProcess Creation
TA0007 · DiscoveryT1018 · Remote System DiscoveryT1087.002 · Domain AccountT1482 · Domain Trust Discovery+2
Janantha Marasinghe+3Tue Feb 02windows
Detectionhightest

PUA - AdvancedRun Suspicious Execution

Detects the execution of AdvancedRun utility in the context of the TrustedInstaller, SYSTEM, Local Service or Network Service accounts

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1134.002 · Create Process with Token
Florian Roth (Nextron Systems)Thu Jan 20windows
Detectionhightest

PUA - Chisel Tunneling Tool Execution

Detects usage of the Chisel tunneling tool via the commandline arguments

WindowsProcess Creation
TA0011 · Command and ControlT1090.001 · Internal Proxy
Florian Roth (Nextron Systems)Tue Sep 13windows
Detectionhightest

PUA - CleanWipe Execution

Detects the use of CleanWipe a tool usually used to delete Symantec antivirus.

WindowsProcess Creation
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Nasreddine Bencherchali (Nextron Systems)Sat Dec 18windows
Detectionhightest

PUA - Crassus Execution

Detects Crassus, a Windows privilege escalation discovery tool, based on PE metadata characteristics.

WindowsProcess Creation
TA0007 · DiscoveryTA0043 · ReconnaissanceT1590.001 · Domain Properties
Martin MuellerMon Apr 17windows
Detectionhightest

PUA - CsExec Execution

Detects the use of the lesser known remote execution tool named CsExec a PsExec alternative

WindowsProcess Creation
TA0042 · Resource DevelopmentT1587.001 · MalwareTA0002 · ExecutionT1569.002 · Service Execution
Florian Roth (Nextron Systems)Mon Aug 22windows
Detectionhightest

PUA - DefenderCheck Execution

Detects the use of DefenderCheck, a tool to evaluate the signatures used in Microsoft Defender. It can be used to figure out the strings / byte chains used in Microsoft Defender to detect a tool and thus used for AV evasion.

WindowsProcess Creation
TA0005 · Defense EvasionT1027.005 · Indicator Removal from Tools
Florian Roth (Nextron Systems)Tue Aug 30windows
Detectionhightest

PUA - DIT Snapshot Viewer

Detects the use of Ditsnap tool, an inspection tool for Active Directory database, ntds.dit.

WindowsProcess Creation
TA0006 · Credential AccessT1003.003 · NTDS
Furkan CaliskanSat Jul 04windows
Detectionhightest

PUA - Fast Reverse Proxy (FRP) Execution

Detects the use of Fast Reverse Proxy. frp is a fast reverse proxy to help you expose a local server behind a NAT or firewall to the Internet.

WindowsProcess Creation
TA0011 · Command and ControlT1090 · Proxy
François Hubaut+1Fri Sep 02windows
Detectionhightest

PUA- IOX Tunneling Tool Execution

Detects the use of IOX - a tool for port forwarding and intranet proxy purposes

WindowsProcess Creation
TA0011 · Command and ControlT1090 · Proxy
Florian Roth (Nextron Systems)Sat Oct 08windows
Detectionhighexperimental

PUA - Kernel Driver Utility (KDU) Execution

Detects execution of the Kernel Driver Utility (KDU) tool. KDU can be used to bypass driver signature enforcement and load unsigned or malicious drivers into the Windows kernel. Potentially allowing for privilege escalation, persistence, or evasion of security controls.

WindowsProcess Creation
TA0003 · PersistenceTA0004 · Privilege EscalationT1543.003 · Windows Service
Matt Anderson+2Fri Jan 02windows
Detectionhightest

PUA - Netcat Suspicious Execution

Detects execution of Netcat. Adversaries may use a non-application layer protocol for communication between host and C2 server or among infected hosts within a network

WindowsProcess Creation
TA0011 · Command and ControlT1095 · Non-Application Layer Protocol
François Hubaut+1Wed Jul 21windows
Detectionhightest

PUA - Ngrok Execution

Detects the use of Ngrok, a utility used for port forwarding and tunneling, often used by threat actors to make local protected services publicly available. Involved domains are bin.equinox.io for download and *.ngrok.io for connections.

WindowsProcess Creation
TA0011 · Command and ControlT1572 · Protocol Tunneling
Florian Roth (Nextron Systems)Fri May 14windows
Detectionhightest

PUA - Nimgrab Execution

Detects the usage of nimgrab, a tool bundled with the Nim programming framework and used for downloading files.

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
François HubautSun Aug 28windows
Detectionhightest

PUA - NirCmd Execution As LOCAL SYSTEM

Detects the use of NirCmd tool for command execution as SYSTEM user

WindowsProcess Creation
TA0002 · ExecutionT1569.002 · Service ExecutionS0029 · S0029
Florian Roth (Nextron Systems)+1Mon Jan 24windows
Detectionhightest

PUA - NPS Tunneling Tool Execution

Detects the use of NPS, a port forwarding and intranet penetration proxy server

WindowsProcess Creation
TA0011 · Command and ControlT1090 · Proxy
Florian Roth (Nextron Systems)Sat Oct 08windows
Detectionhightest

PUA - NSudo Execution

Detects the use of NSudo tool for command execution

WindowsProcess Creation
TA0002 · ExecutionT1569.002 · Service ExecutionS0029 · S0029
Florian Roth (Nextron Systems)+1Mon Jan 24windows
Detectionhightest

PUA - PingCastle Execution From Potentially Suspicious Parent

Detects the execution of PingCastle, a tool designed to quickly assess the Active Directory security level via a script located in a potentially suspicious or uncommon location.

WindowsProcess Creation
TA0043 · ReconnaissanceT1595 · Active Scanning
Nasreddine Bencherchali (Nextron Systems)+1Thu Jan 11windows
Detectionhightest

PUA - Rclone Execution

Detects execution of RClone utility for exfiltration as used by various ransomwares strains like REvil, Conti, FiveHands, etc

WindowsProcess Creation
TA0010 · ExfiltrationT1567.002 · Exfiltration to Cloud Storage
Bhabesh Raj+2Mon May 10windows
Detectionhighexperimental

PUA - Restic Backup Tool Execution

Detects the execution of the Restic backup tool, which can be used for data exfiltration. Threat actors may leverage Restic to back up and exfiltrate sensitive data to remote storage locations, including cloud services. If not legitimately used in the enterprise environment, its presence may indicate malicious activity.

WindowsProcess Creation
TA0010 · ExfiltrationT1048 · Exfiltration Over Alternative ProtocolT1567.002 · Exfiltration to Cloud Storage
Nounou Mbeiri+1Fri Oct 17windows
Detectionhightest

PUA - RunXCmd Execution

Detects the use of the RunXCmd tool to execute commands with System or TrustedInstaller accounts

WindowsProcess Creation
TA0002 · ExecutionT1569.002 · Service ExecutionS0029 · S0029
Florian Roth (Nextron Systems)Mon Jan 24windows
Detectionhightest

PUA - Seatbelt Execution

Detects the execution of the PUA/Recon tool Seatbelt via PE information of command line parameters

WindowsProcess Creation
TA0007 · DiscoveryT1526 · Cloud Service DiscoveryT1087 · Account DiscoveryT1083 · File and Directory Discovery
Nasreddine Bencherchali (Nextron Systems)Tue Oct 18windows
Detectionhightest

PUA - Wsudo Suspicious Execution

Detects usage of wsudo (Windows Sudo Utility). Which is a tool that let the user execute programs with different permissions (System, Trusted Installer, Administrator...etc)

WindowsProcess Creation
TA0002 · ExecutionTA0004 · Privilege EscalationT1059 · Command and Scripting Interpreter
Nasreddine Bencherchali (Nextron Systems)Fri Dec 02windows